Articoli correlati a Ninja Hacking: Unconventional Penetration Testing Tactics...

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques - Brossura

 
9781597495882: Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Sinossi

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, the historical Ninjutsu techniques in particular, with the present hacking methodologies. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzus The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators.

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Informazioni sugli autori

Thomas Wilhelm has been involved in Information Security since 1990, where he served in the U.S. Army for 8 years as a Signals Intelligence Analyst, Russian Linguist, and a Cryptanalyst. His expertise in the field of Information Security has led him to speak at prominent security conferences across the United States, including DefCon, HOPE, and CSI.

Thomas has contributed significantly to the field of professional penetration testing and information security. In his capacity as both a practice director and a managing director, he has played a pivotal role in executing offensive and defensive security initiatives for Fortune 100 companies and leading research and tool development that has influenced the security industry. Presently, he serves as a managing director at Redstone Securities and possesses master’s degrees in both Computer Science and Management.

His influence also extends to education where he formerly held the position of Associate Professor at Colorado Technical University. Thomas has also written various publications, including magazines and books. Through Pentest.TV, he continues to provide advanced security training and has obtained numerous certifications over the years, including the ISSMP, CISSP, CCNP Security, AWS Cloud Solutions Architect, AWS Cloud Security Specialist, and multiple Solaris certifications as well.



Jason Andress (CISSP, ISSAP, CISM, GPEN) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics.

Dalla quarta di copertina

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today s ninja, the hacker? Penetration testers and security consultants perform tests both externally and internally for clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now, and see how thinking and acting like a ninja could actually grant you quicker and more complete access to a company s assets. Get in before the hacker does with these unorthodox techniques -- using all of the tools that the ninja has: disguise, espionage, stealth, and concealment. Learn how to benefit from these tools by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don t you want to be a ninja for a day just because they re cool? Let this book be your excuse!

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

Compra usato

Condizioni: buono
Pages can have notes/highlighting...
Visualizza questo articolo

EUR 10,45 per la spedizione da U.S.A. a Italia

Destinazione, tempi e costi

EUR 11,54 per la spedizione da Regno Unito a Italia

Destinazione, tempi e costi

Risultati della ricerca per Ninja Hacking: Unconventional Penetration Testing Tactics...

Foto dell'editore

Wilhelm, Thomas; Andress, Jason
Editore: Syngress Publishing, 2010
ISBN 10: 1597495883 ISBN 13: 9781597495882
Antico o usato Paperback

Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.62. Codice articolo G1597495883I3N00

Contatta il venditore

Compra usato

EUR 9,17
Convertire valuta
Spese di spedizione: EUR 10,45
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Wilhelm, Thomas und Jason Andress:
Editore: Syngress, 2010
ISBN 10: 1597495883 ISBN 13: 9781597495882
Antico o usato Brossura

Da: Roland Antiquariat UG haftungsbeschränkt, Weinheim, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Illustrated. 336 p. Unread book. Very good condition. Minimum traces of storage. 9781597495882 Sprache: Englisch Gewicht in Gramm: 703 Softcover: 19.1 x 1.9 x 23.5 cm. Codice articolo 219361

Contatta il venditore

Compra usato

EUR 18,90
Convertire valuta
Spese di spedizione: EUR 11,95
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Wilhelm, Thomas/ Andress, Jason
Editore: Syngress Media Inc, 2010
ISBN 10: 1597495883 ISBN 13: 9781597495882
Nuovo Paperback

Da: Revaluation Books, Exeter, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: Brand New. 1st edition. 376 pages. 9.10x7.50x1.00 inches. In Stock. Codice articolo __1597495883

Contatta il venditore

Compra nuovo

EUR 35,59
Convertire valuta
Spese di spedizione: EUR 11,54
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: 2 disponibili

Aggiungi al carrello

Foto dell'editore

Thomas Wilhelm
Editore: Syngress Media,U.S., 2010
ISBN 10: 1597495883 ISBN 13: 9781597495882
Nuovo Paperback / softback

Da: THE SAINT BOOKSTORE, Southport, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback / softback. Condizione: New. New copy - Usually dispatched within 4 working days. 742. Codice articolo B9781597495882

Contatta il venditore

Compra nuovo

EUR 39,32
Convertire valuta
Spese di spedizione: EUR 12,04
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Wilhelm, Thomas|Andress, Jason
Editore: Syngress Media|Syngress, 2010
ISBN 10: 1597495883 ISBN 13: 9781597495882
Nuovo Brossura
Print on Demand

Da: moluna, Greven, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Discusses techniques used by malicious attackers in real-world situations details unorthodox penetration testing techniques by getting inside the mind of a ninja and, expands upon penetration testing methodologies including new tactics for hardware and ph. Codice articolo 596371792

Contatta il venditore

Compra nuovo

EUR 49,09
Convertire valuta
Spese di spedizione: EUR 9,70
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Foto dell'editore

Thomas Wilhelm, Jason Andress
Editore: Syngress 2010-09-23, 2010
ISBN 10: 1597495883 ISBN 13: 9781597495882
Nuovo Paperback

Da: Chiron Media, Wallingford, Regno Unito

Valutazione del venditore 4 su 5 stelle 4 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: New. Codice articolo 6666-ELS-9781597495882

Contatta il venditore

Compra nuovo

EUR 36,37
Convertire valuta
Spese di spedizione: EUR 23,07
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: Più di 20 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Thomas Wilhelm
Editore: Elsevier Science Sep 2010, 2010
ISBN 10: 1597495883 ISBN 13: 9781597495882
Nuovo Taschenbuch
Print on Demand

Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers. Discusses techniques used by malicious attackers in real-world situations Details unorthodox penetration testing techniques by getting inside the mind of a ninja Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks 336 pp. Englisch. Codice articolo 9781597495882

Contatta il venditore

Compra nuovo

EUR 48,70
Convertire valuta
Spese di spedizione: EUR 11,00
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: 2 disponibili

Aggiungi al carrello

Immagini fornite dal venditore

Thomas Wilhelm
Editore: Elsevier Science, 2010
ISBN 10: 1597495883 ISBN 13: 9781597495882
Nuovo Taschenbuch
Print on Demand

Da: AHA-BUCH GmbH, Einbeck, Germania

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Taschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers. Discusses techniques used by malicious attackers in real-world situations Details unorthodox penetration testing techniques by getting inside the mind of a ninja Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. Codice articolo 9781597495882

Contatta il venditore

Compra nuovo

EUR 53,82
Convertire valuta
Spese di spedizione: EUR 14,99
Da: Germania a: Italia
Destinazione, tempi e costi

Quantità: 2 disponibili

Aggiungi al carrello

Foto dell'editore

WILHELM T
Editore: ELSEVIER, 2011
ISBN 10: 1597495883 ISBN 13: 9781597495882
Nuovo Brossura

Da: UK BOOKS STORE, London, LONDO, Regno Unito

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Condizione: New. Brand New! Fast Delivery US Edition and ship within 24-48 hours. Deliver by FedEx and Dhl, & Aramex, UPS, & USPS and we do accept APO and PO BOX Addresses. Order can be delivered worldwide within 7-10 days and we do have flat rate for up to 2LB. Extra shipping charges will be requested if the Book weight is more than 5 LB. This Item May be shipped from India, United states & United Kingdom. Depending on your location and availability. Codice articolo CBS 9781597495882

Contatta il venditore

Compra nuovo

EUR 63,80
Convertire valuta
Spese di spedizione: EUR 5,76
Da: Regno Unito a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Foto dell'editore

Wilhelm MSc ISSMP CISSP SCSECA and SCNA, Thomas
Editore: Syngress, 2010
ISBN 10: 1597495883 ISBN 13: 9781597495882
Nuovo Paperback

Da: Toscana Books, AUSTIN, TX, U.S.A.

Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

Paperback. Condizione: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks. Codice articolo Scanned1597495883

Contatta il venditore

Compra nuovo

EUR 44,03
Convertire valuta
Spese di spedizione: EUR 25,76
Da: U.S.A. a: Italia
Destinazione, tempi e costi

Quantità: 1 disponibili

Aggiungi al carrello

Vedi altre 6 copie di questo libro

Vedi tutti i risultati per questo libro